Vulnerability in PasswordSafe (Mateso)

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters, as opposed to using ‘Content here, content here’, making it look like readable English. Many desktop

Twitter
LinkedIn
Facebook

Vulnerability type

Weak Cryptography

Pentester

Dr. Dominic Welsch

Publication

April 3, 2023

Software version

PasswordSafe 8.12.1.22757 (according to the manufacturer, the current version 8.13.9.26689 was also affected at the time)

Timeline

– 26.01.2022: Contact with Mateso by email

– 26.01.2022: Response from Mateso

– 02.02.2022: Consultation with Mateso

– 03.03.2022: Telephone call with Mateso – Update planned by the end of August 2022

– 04.03.2022: No response to HanseSecure requests since then.

– 11.02.2032: Resumption of contact by Mateso.

– 05.05.2024 Publication of CVE